VMWare use of Gratuitous ARP REPLY
Posted
by
trs80
on Server Fault
See other posts from Server Fault
or by trs80
Published on 2014-08-24T17:15:39Z
Indexed on
2014/08/24
22:22 UTC
Read the original article
Hit count: 244
vmware-esxi
|arp
I have an ESXi cluster that hosts several Windows Server VMs and around 30 Windows workstation VMs. Packet captures show a high number of ARP replies of the form: -sender_ip: VM IP -sender_mac: VM virtual MAC -target_ip: 0.0.0.0 -target_mac: Switch interface MAC
The specific addresses aren't really a concern -- they're all legitimate and we're not having any problems with communications (most of the questions surrounding GARP and VMWare have to do with ping issues, a problem we don't have). I'm looking for an explanation of the traffic pattern in an environment that functions as expected.
So the question is why would I see a high number of unsolicited ARP replies? Is this a mechanism VMWare uses for some purpose? What is it? Is there an alternative?
EDIT: Quick diagram: [esxi]--[switch vlan]--[inline IDS]--[fw]--(rest of network)
The IDS is complaining about these unsolicited ARPs. Several IDS vendors trigger on ARP replies without a prior request, or for ARP replies that have a target IP of 0.0.0.0.
The target MAC in these replies is the VLAN interface on the switch.
Capture points: -The IDS grabs the offending packets -The FW can see the same ones -A VM on the ESXi host does not see these, although there is an ARP request for a specific IP on the ESXi host that has source_ip=0.0.0.0 and source_mac=[switch vlan interface].
I can't share the captures, unfortunately.
Really I'm interested in finding out if this is normal for an ESXi deployment.
© Server Fault or respective owner